COMPUTER FUNDAMENTALS

COMPUTER PERIPHERALS

MOBILE DEVICES AND SMARTPHONES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Bluetooth security uses the ____ to generate the encryption key used to secure communication.
A
link key
B
encryption code
C
link code
D
None of the above
Explanation: 

Detailed explanation-1: -The security of Bluetooth uses the concept of two separate keys, an authentication key and an encryption key. The authentication key is the master key, and encryption keys are regenerated with each new session. A random number, generated for each transaction, adds additional security.

Detailed explanation-2: -Bluetooth uses a frequency-hopping spread spectrum to prevent this attack. Both of the communicating devices calculate a frequency-hopping sequence and the seed of the sequence is a function of the Bluetooth device address (BD ADDR) and the clock.

Detailed explanation-3: -Bluetooth security encryption can be easily broken Therefore, they need to “talk” to each other to decide on the key length. In Key Negotiation of Bluetooth (KNOB) attack, hackers intercept this process and make one of the devices “offer” to use a weak encryption key that can be as short as 1 byte.

There is 1 question to complete.